Please, let Cyderes know you found this job
on RemoteYeah.
This helps us grow 🌱.
Description:
The Principal Security Analyst is a customer-facing role focused on delivering security solutions and exceptional client experiences.
This position requires acting as a trusted advisor responsible for strategic advisory, advanced analysis, and custom security content for Cyderes’ managed service customers.
The role involves owning security outcomes for assigned customers, ensuring high-quality SOC deliverables and alignment with client expectations.
Responsibilities include leading customer-facing calls to discuss incident investigations, providing strategic guidance, and offering recommendations for improving security posture.
The analyst will perform advanced threat hunting and proactive investigations to detect, isolate, and mitigate malicious activities in customer environments.
Acting as a technical lead within the SOC, the analyst will provide mentorship, guidance, and leadership to other Security Analysts.
The role requires overseeing real-time monitoring and detection activities using SIEM, EDR, and other security tools to ensure timely identification and escalation of threats.
Collaboration with internal teams, such as Detection Engineering, is necessary to refine detection rules and enhance automation workflows.
The analyst will maintain and update security operations processes and incident response playbooks to ensure they remain current and effective.
Providing training to Security Analysts on tools, processes, and emerging threats is also a key responsibility.
The role includes leading post-incident reviews, identifying lessons learned, and sharing findings to improve operational effectiveness.
Tailoring detection and response strategies to meet the unique needs of individual customer environments is essential.
Staying informed of the evolving threat landscape to provide actionable insights and ensure a proactive approach to security operations is required.
Requirements:
A minimum of 5+ years of professional experience in cybersecurity, with a strong background in security operations is required.
Expertise in securing and investigating security incidents on Windows, Unix/Linux, and MacOS environments is necessary.
An advanced understanding of networking concepts, including the ability to analyze network artifacts and logs effectively, is required.
Hands-on experience with EDR tools such as SentinelOne, CrowdStrike, Microsoft Defender, or equivalent platforms is essential.
Advanced knowledge and experience with at least one SIEM platform, such as Microsoft Sentinel, Splunk, Google Chronicle, or IBM QRadar, is required.
Proficiency in threat hunting, malware analysis, and leveraging security tools to investigate and mitigate threats is necessary.
Strong written and verbal communication skills, with the ability to create and present reports, dashboards, and strategic recommendations, are required.
Industry-recognized certifications such as CISSP, GCIH, GCFA, OSCP, or equivalent are preferred.
Benefits:
Cyderes offers a dynamic work environment with opportunities for professional growth and development.
The company provides a comprehensive benefits package, including health, dental, and vision insurance.
Employees have access to a flexible work schedule and the option to work remotely.
Cyderes promotes a culture of diversity and inclusion, ensuring equal opportunity for all employees.
The company supports continuous learning and offers resources for obtaining industry-recognized certifications.
Apply now
Please, let Cyderes know you found this job
on RemoteYeah
.
This helps us grow 🌱.